Re: [DNSOP] More comments on draft-wessels-edns-key-tag-00

Edward Lewis <edward.lewis@icann.org> Wed, 25 November 2015 14:34 UTC

Return-Path: <edward.lewis@icann.org>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B24071B2D5D for <dnsop@ietfa.amsl.com>; Wed, 25 Nov 2015 06:34:02 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.606
X-Spam-Level:
X-Spam-Status: No, score=-2.606 tagged_above=-999 required=5 tests=[BAYES_05=-0.5, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.585, SPF_NEUTRAL=0.779] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eReeG57x0M0M for <dnsop@ietfa.amsl.com>; Wed, 25 Nov 2015 06:34:00 -0800 (PST)
Received: from out.west.pexch112.icann.org (pfe112-ca-1.pexch112.icann.org [64.78.40.7]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9A0141B2D52 for <dnsop@ietf.org>; Wed, 25 Nov 2015 06:34:00 -0800 (PST)
Received: from PMBX112-W1-CA-1.pexch112.icann.org (64.78.40.21) by PMBX112-W1-CA-1.pexch112.icann.org (64.78.40.21) with Microsoft SMTP Server (TLS) id 15.0.1044.25; Wed, 25 Nov 2015 06:33:58 -0800
Received: from PMBX112-W1-CA-1.pexch112.icann.org ([64.78.40.21]) by PMBX112-W1-CA-1.PEXCH112.ICANN.ORG ([64.78.40.21]) with mapi id 15.00.1044.021; Wed, 25 Nov 2015 06:33:58 -0800
From: Edward Lewis <edward.lewis@icann.org>
To: "Wessels, Duane" <dwessels@verisign.com>
Thread-Topic: More comments on draft-wessels-edns-key-tag-00
Thread-Index: AQHRJtmPXkdjXahmsEiTn01cYVzaVZ6sNYcAgADLrwA=
Date: Wed, 25 Nov 2015 14:33:58 +0000
Message-ID: <D27B2BCC.11857%edward.lewis@icann.org>
References: <D279FE55.117EB%edward.lewis@icann.org> <CD88ACBF-9E78-4D9D-920B-381694059BDA@verisign.com>
In-Reply-To: <CD88ACBF-9E78-4D9D-920B-381694059BDA@verisign.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/14.5.8.151023
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [192.0.47.234]
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg="sha1"; boundary="B_3531288834_11252467"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/dnsop/1for3G7Hx-CjdbWdHTAoGMTCirg>
Cc: "dnsop@ietf.org" <dnsop@ietf.org>
Subject: Re: [DNSOP] More comments on draft-wessels-edns-key-tag-00
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 25 Nov 2015 14:34:02 -0000


On 11/24/15, 16:24, "Wessels, Duane" <dwessels@verisign.com> wrote:

>I'd put it slightly differently.  I'd say it is most useful for
>"configured
>trust anchors" whether they're updated with RFC 5011, or not.  By
>"configured
>trust anchor" I mean the trust anchor material that exists outside the
>name server process, survives restarts and reboots, etc.
>
>As currently written the draft also applies to cached trust anchors (i.e.,
>DS records) and I've had people tell me they think that could be useful.
>But if the consensus is that edns-key-tag should only be reported for
>configured trust anchors, I could live with that.

Okay, I've been myopically focused on 5011 for some time now.  That's my
story and I'm sticking to it.

>But then you only get data for validators doing 5011 and doing it
>correctly.
>This is part of the problem we have with the root -- if there are
>validators
>with manually configured keys, we'd like to know about them.
>
>OTOH, really nothing in the draft is mandatory (except for the MUST
>NOTs).  So
>an implementation of edns-key-tag could absolutely choose to only send the
>values for RFC-5011 queries.

You're right that the need is wider than 5011 cases.

In an effort to simplify and streamline this (for reasons I'll include
later), what about telling a querier to only send this option when it is
sending a query to an IP address that is authoritative for the DNSKEY set?
 I mean that as a toss-up question.

Can the querier know when that is happening?  I believe so but I don't
know if implementations can tell that (in time).  What I'm trying to rule
out are "stubs" that are sending queries to "upstream" validators or
forwarders.

The reason for this is to limit the times a stub exposes the trust anchors
it has (in case one is known to be exploitable) and to avoid having to
come up with rules for union-ing the possible lists of key tags. Or, to
ask another toss up - is there benefit in telling the upstream what trust
anchors are held?  (If there's a conflict between the two (which could
also be sever clock skew), use 'CD' in queries.)  I'm not sure there's a
benefit telling anyone other than the authority for the trust anchors
about the set held.

Now what I am trying to imagine is how the receiver of the option reacts.
I don't know that I'd recommend any active reaction - like trying to
inform the querier that their set of tags is out of date.  I have the
sense that there might be a benefit within a small use case but trying to
do that would proliferate corner cases as well as work against the loose
coupling that allows DNS to work at scale.

I imagine I'd look at packet traces to see what is being sent in, counting
IP addresses with/by tags of interest.  I.e., out of band (to port 53)
massaging of the data and reacting to it.  While I realize that during a
key roll there will always be late comers, having a gauge of how many are
ready for new signatures is helpful to the roll process.

The response - what would be in it?  Should it be empty?  Should it
include a set of tags (but what set of tags?). I ask the last because the
authoritative server would be configured or deduce the set of tags it sees
which might not agree with what a RFC 5011 validator may have picked up.
(I.e., keys in the AddPend state are trust anchors in the server, not
mature enough to be trusted in the client.)  Should it be the set of
intended trust anchors or the set of what is thought a 5011 validator
(there that focus goes again) would think the tags should be?